It is natural to wonder whether it is possible to achieve the ``best of both worlds'': namely, a single protocol that simultaneously achieves the best possible security in both the above settings. Here, we rule out this possibility (at least for general functionalities) but show some positive results regarding what \emph{can} be achieved.
Category / Keywords: foundations / secure computation, guaranteed output delivery, privacy Publication Info: This is a full version of the combination of two papers by the authors. The first paper by Ishai, Kushilevitz, Lindell and Petrank appeared at CRYPTO 2006 and the second paper by Katz appeared at STOC 2007. Date: received 20 Jan 2010 Contact author: lindell at cs biu ac il Available format(s): PDF | BibTeX Citation Version: 20100122:035546 (All versions of this report) Short URL: ia.cr/2010/029 Discussion forum: Show discussion | Start new discussion